Since the publication of “IT Auditing: An Adaptive Process”, audit standards and guidelines have been added or revised to establish a new baseline for performing assurance services. These... More > pronouncements have made parts of my original edition incomplete. Thus, "IT Auditing: An Adaptive System" has additional detail information necessary to bridge this knowledge gap by updating all of the following chapters:
Chapter 1 Planning,
Chapter 2 Study and Evaluation of Controls,
Chapter 3 Testing and Evaluating, and
Chapter 4 Reporting.
Historically, ISACA’s audit standards and guidelines did not include statements addressing assurance follow-up mandatory requirements and practice recommendations. Therefore, in response to these changes, another chapter was written to accommodate the addition of ISACA’s standard and guideline regarding the follow-up process. This new chapter is consistent with generally accepted follow-up procedures as well as ISACA’s standards and guidelines.< Less

Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. For this purpose, mechanisms exist that can be... More > utilized to ensure hardware, software, and other resources are operated on by only those tasks that have gained proper authorization.
“Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics. Through this publication, security professionals will acquire an appreciation for the complexities associated with ensuring an adequate information security program.< Less

“IT Auditing: An Adaptive Process” is a self-contained tool for learning IT audit process flexibility -- while performing effective IT audits -- as well as companion subject matter... More > material for “IT Auditing: The Process.” Specifically, “IT Auditing: An Adaptive Process” is an enhanced and consolidated version of four IT audit monographs.
This workbook invites the reader to practice IT auditing based on generally accepted IT audit standards and guidelines through detailed examples. Furthermore, this workbook allows an IT auditor to understand various steps and processes required to adequately initiate, document, and compile IT audit phases.< Less

“IT Auditing: An Adaptive Process” is a self-contained tool for learning IT audit process flexibility -- while performing effective IT audits -- as well as companion subject matter... More > material for “IT Auditing: The Process.” Specifically, “IT Auditing: An Adaptive Process” is an enhanced and consolidated version of four IT audit monographs.
This workbook invites the reader to practice IT auditing based on generally accepted IT audit standards and guidelines through detailed examples. Furthermore, this workbook allows an IT auditor to understand various steps and processes required to adequately initiate, document, and compile IT audit phases.< Less

Since the publication of “IT Auditing: An Adaptive Process”, audit standards and guidelines have been added or revised to establish a new baseline for performing assurance services. These... More > pronouncements have made parts of my original edition incomplete. Thus, "IT Auditing: An Adaptive System" has additional detail information necessary to bridge this knowledge gap by updating all of the following chapters:
Chapter 1 Planning,
Chapter 2 Study and Evaluation of Controls,
Chapter 3 Testing and Evaluating, and
Chapter 4 Reporting.
Historically, ISACA’s audit standards and guidelines did not include statements addressing assurance follow-up mandatory requirements and practice recommendations. Therefore, in response to these changes, another chapter was written to accommodate the addition of ISACA’s standard and guideline regarding the follow-up process. This new chapter is consistent with generally accepted follow-up procedures as well as ISACA’s standards and guidelines.< Less

Since the publication of “IT Auditing: An Adaptive Process”, audit standards and guidelines have been added or revised to establish a new baseline for performing assurance services. These... More > pronouncements have made parts of my original edition incomplete. Thus, "IT Auditing: An Adaptive System" has additional detail information necessary to bridge this knowledge gap by updating all of the following chapters:
Chapter 1 Planning,
Chapter 2 Study and Evaluation of Controls,
Chapter 3 Testing and Evaluating, and
Chapter 4 Reporting.
Historically, ISACA’s audit standards and guidelines did not include statements addressing assurance follow-up mandatory requirements and practice recommendations. Therefore, in response to these changes, another chapter was written to accommodate the addition of ISACA’s standard and guideline regarding the follow-up process. This new chapter is consistent with generally accepted follow-up procedures as well as ISACA’s standards and guidelines.< Less

Since the publication of “IT Auditing: An Adaptive Process”, audit standards and guidelines have been added or revised to establish a new baseline for performing assurance services. These... More > pronouncements have made parts of my original edition incomplete. Thus, "IT Auditing: An Adaptive System" has additional detail information necessary to bridge this knowledge gap by updating all of the following chapters:
Chapter 1 Planning,
Chapter 2 Study and Evaluation of Controls,
Chapter 3 Testing and Evaluating, and
Chapter 4 Reporting.
Historically, ISACA’s audit standards and guidelines did not include statements addressing assurance follow-up mandatory requirements and practice recommendations. Therefore, in response to these changes, another chapter was written to accommodate the addition of ISACA’s standard and guideline regarding the follow-up process. This new chapter is consistent with generally accepted follow-up procedures as well as ISACA’s standards and guidelines.< Less

Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. For this purpose, mechanisms exist that can be... More > utilized to ensure hardware, software, and other resources are operated on by only those tasks that have gained proper authorization.
“Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics. Through this publication, security professionals will acquire an appreciation for the complexities associated with ensuring an adequate information security program.< Less

About Dr. Robert E. Davis, MBA, DBA, CISA, CICA

Robert E. Davis, MBA, DBA, CISA, CICA is a management audit consultant/senior audit manager, a published author as well as a university-level instructor. His unique qualifications encompass more than twenty-five years of acquired audit, information security, and accounting practice knowledge. Professionally, he has been recognized as an accomplished, energetic auditor, author, freelance writer, and speaker with a strong mix of experience and skills in monitoring and evaluating controls. If you have any questions or comments, Robert can be reached at: bobdcisa@yahoo.com